Important Computer Questions Asked in Previous Year Papers for Upcoming Exams 2017

Important Computer Questions Asked in Previous Year Papers for Upcoming Exams 2017 Set-54:

Dear Readers, the List of important computer Quiz from previous year papers were given here for upcoming exams 2017 was given here. Candidates those who are preparing for the exams can use this.

1). The letter and number of the intersecting column and row is the
a)  cell location
b)  cell position
c)  cell address
d)  cell coordinates
e)  cell contents


2). A set of rules for telling the computer what operations to perform is called a
a)  procedural language
b)  structures
c)  natural language
d)  command language
e)  programming language


3). The CPU comprises Control, Memory, and _______ Units.
a)  Microprocessor
b)  Arithmetic/Logic
c)  Output
d)  ROM
e)  Input


4). _________ devices convert human-understandable data and programs into a form that the computer can process.
a)  Printing
b)  Output
c)  Solid state
d)  Monitor
e)  Input


5). Networks are monitored by security personnel and supervised by who set(s) up accounts and passwords for authorised network users.
a)  IT managers
b)  the government
c)  network administrators
d)  password administrators
e)  None of these


6). The human-readable version of a program is called
a)  source code
b)  program code
c)  human code
d)  system code
e)  None of these


7). A gateway can be used on which of the following layers of the OSI model?
a)  Application
b)  Network
c)  Session
d)  All of the above
e)  None of the above


8). Meaningful filename helps in easy file
a)  storing
b)  accessing
c)  identification
d)  printing
e)  None of these


9). Hackers
a)  have the same motive
b)  are people who maintain computers
c)  may legally break into computers as long as they do not do any damage.
d)  are people who are allergic to computers.
e)  break into other people’s computers.


10). Unauthorised copying of software to be used for personal gain instead of for personal backups is called
a)  program theft
b)  data snatching
c)  software piracy
d)  program looting
e)  data looting


Answers:
1) C   2) E   3) B   4) E   5) C   6) A   7) D   8) B   9) E   10) C

 

0 0 votes
Rating
guest
0 Comments
Inline Feedbacks
View all comments